Share

Learn how to build secure DevSecOps pipelines for Salesforce with Mala Punyani, Director of Engineering at DocuSign, who has spent 18 years implementing security and DevSecOps practices from zero to fully automated pipelines across enterprise SaaS applications.

In this Salesforce Security Office Hours session, host Matt Myers, Matt Meyers, Salesforce CTA and CoFounder and CEO of EzProtect., and Mala discuss shift left security strategies including secret scanning implementation, just-in-time access for service accounts, automated CI/CD security gates, policy as code, static code analysis with custom rules, and data masking for sandbox environments.

Discover why continuous auditing matters more than one-time guardrails, how to build security champions within development teams, and why starting with credential security delivers quick wins before tackling legacy code scanning.

 

Your Salesforce data is invaluable—is it truly secure? If you are allowing users to upload files into your Salesforce orgs, you are risk of also uploaded viruses and consequential data breaches. Get in contact with us today. 

Share

Did you love this blog and wish there could be more?

It is our goal to keep you informed about everything you need to know about Salesforce security to keep your Salesforce data and company safe and secure by providing you with the highest quality of original content.

If this sounds good to you, then sign-up below to be one of the first to know when the next super awesome Salesforce security blog has been released.

Download your free guide today!

Learn if you are at risk and how to start protecting your users!

GET THE FACTS NOW